9 5 finally since comparing checkpoint inducing conditions is not sufficient for comparing protocol performance we present some formal techniques for comparing the performance of several existing rdt protocols